/ Recently Commented

Could This Be the Silver Bullet for Cloud Computing

This article on cloud appeared in the Economist.com on April 12th 2001 titled "The Beast of Complexities" Stuart Feldman of IBM, mentions these examples. Quote 'Picture yourself as the product manager of a new hand-held computer whose design team has just sent him the electronic blueprint for the device. You go to your personalized web portal and order the components, book manufacturing capacity and arrange for distribution. With the click of a mouse, you create an instant supply chain that, once the job is done, will dissolve again." unquote. ...In the same article he also lamented that so far, nobody has found a silver bullet to kill the Beast of Complexity. more

LTE and Spectrum Stupidity

Mobile operators are counting on Long Term Evolution (LTE) technology to handle surging demand for mobile data access. But LTE developers made some poor choices, cutting spectral efficiency and thus driving up operator costs. LTE was envisioned as an all IP system, but the RF allocations follow the voice-centric approach of earlier generations. While LTE standards allow for either Frequency Division Duplexing (FDD) or Time Division Duplexing (TDD), all initial LTE equipment uses FDD. FDD requires two separate blocks of spectrum... more

ICANN’s Board Decisions in Nairobi Will Determine Its Credibility and Respect for Years to Come

Today is the morning of the most revered Thursday in the ICANN meetings calendar -- The public forum. It is tradition personified. It is the day when the show and the showcasing really begin. It is the stage and the choreography of the open microphone that can help influence ICANN decisions one way or another and make the supposed bottom up model appear at its best. more

Sender Address Verification: Still a Bad Idea

A lot of spam uses fake return addresses. So back around 2000 it occurred to someone that if there were a way to validate the return addresses in mail, they could reject the stuff with bad return addresses. A straightforward way to do that is a callout, doing a partial mail transaction to see if the putative sender's mail server accepts mail to that address. This approach was popular for a few years, but due to its combination of ineffectiveness and abusiveness, it's now used only by small mail systems whose managers don't know any better. What's wrong with it? more

ICANN Board Meeting Spoiler Alert

For those participants that have been working rearranged hours and participating remotely in connection with ICANN's Nairobi meeting, here is a chance to sleep in. While ICANN Board tea leaf reading is not an exact science, there is a great deal of predictability to ICANN's actions so here are my big three predictions for tomorrow. more

Whither .XXX?

What's going to happen this week on .XXX? Nairobi is the first public board meeting since the independent review panel's nonbinding declaration in February that ICANN acted against its own rules in refusing to go ahead with .XXX. Reports that ICANN is going to 'do something' about .XXX have gone around the world via BBC news, and even surfaced on the radio in rural Ireland. The ICM team are out in force here in Nairobi, and there is endless speculation about what will happen at the Board's meeting on Friday. more

American National Broadband Plan Good First Step

The National Broadband Plan that the FCC will present on 17 March will set the USA on a completely different telecoms path. This plan will hopefully show Congress that it is worthwhile making the legislative changes that will deliver the social and economic benefits of a national broadband infrastructure. more

Are Portable Email Addresses Possible?

News reports say that the Israeli government is close to passing a law that requires portable e-mail addresses, similar to portable phone numbers. Number portability has been a success, making it much easier to switch from one provider to another, and address portability might ease switching among ISPs. But e-mail is not phone calls. Is it even possible? more

ICANN CEO Urges African Telcos to Shatter Monopolies

ICANN CEO, Rod Beckstrom, urges African leaders to "shatter" telecommunications monopolies in their nations in order to help lower the price of Internet access to their citizens during his opening remarks at the start of the 37th ICANN meeting in Nairobi, Kenya. Beckstrom noted that while 15 percent of the world's population lives in Africa, Africans make up less than 7 percent of all Internet users. more

ICANN and Its Responsibilities to the Global Public Interest

In 1998, the United States government might have taken a different path in asserting its control over the technical administration of the DNS. It might have asserted full U.S. governmental control, or it might have turned over the functions to an international body such as the International Telecommunications Union. Instead, it created a "private-public partnership", incorporated as a California "nonprofit public benefit corporation", with a charter giving the company a dual mission of quasi-governmental functions combined with responsibility for operational stability of the Internet. more

Country Internet Registries: One African Perspective

Paul Wilson, Secretary-General of APNIC, was correct when he reminded the panelists of the IGF2009 workshop "Adopting IPv6: What You Need To Know" that "countries don't typically get IP address allocations, network service providers do". The ITU stills seems to cling to the notion that countries get IP blocks... more

Google Beats Facebook in Popularity Because it Supports More Languages (For Now)

John Yunker co-founder of Byte Level Research and author of The Web Globalization Report Card writes: "The big story this year is that Facebook and Google finished in a numerical tie. But because Google supports more languages (for now), it edged out as the winner. ... Even as we look across all 225 web sites, the number of languages continues to increase. Although the rate of language growth slowed over the past two years -- due in large part to the global recession -- growth continues. This year, the average number of languages increased to 22, up from 20 languages in 2008." more

Creditor Can Execute Against Domain Name Where Registry is Located: Office Depot v. Zuccarini

The Ninth Circuit affirmed the district court's ruling in Office Depot v. Zuccarini, agreeing that a creditor may levy against a domain name in the jurisdiction where the domain name registry is located. The decision is significant for two reasons. First, it affirms (or reaffirms) that domain names are property subject to the claims of creditors... more

Closing in on the Google Hackers

Joseph Menn has an article on CNN.com wherein the crux of the story is that US experts are closing in on the hackers that broke into Google last month. It is believed by some that the Chinese government sponsored these hackers. China, naturally, denied involvement. My own take is that tools today are sophisticated enough such that you don't necessarily need state sponsorship in order to launch a cyber attack. more

OpenDNS Adopts Proposed DNS Security Solution: DNSCurve

For more than 15 years, the IETF has been working on DNSSEC, a set of extensions to apply digital signatures to DNS. Millions of dollars in government grants and several reboots from scratch later, DNSSEC is just starting to see real world testing. And that testing is minimal -- only about 400 of the more than 85,000,000 .com domains support DNSSEC, fewer than 20% of US government agencies met their mandated December 31, 2009 deadline for DNSSEC deployment, and only two of the thirteen root zone name servers is testing with even dummy DNSSEC data. more